Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30607: n/a

0
High
VulnerabilityCVE-2024-30607cvecve-2024-30607
Published: Thu Mar 28 2024 (03/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the deviceId parameter of the saveParentControlInfo function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 14:11:36 UTC

Technical Analysis

CVE-2024-30607 is a stack overflow vulnerability identified in the Tenda FH1203 router firmware version 2.0.1.6. The vulnerability arises from improper handling of the deviceId parameter in the saveParentControlInfo function. Specifically, the function fails to properly validate or limit the size of the input, allowing an attacker to overflow the stack memory. This type of vulnerability (CWE-121) can enable an attacker to overwrite critical memory regions, potentially leading to arbitrary code execution or denial of service. The CVSS v3.1 score of 8.0 reflects the high impact on confidentiality, integrity, and availability, with an attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), low privileges (PR:L), and no user interaction (UI:N). The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component. Although no patches or exploits are currently publicly available, the vulnerability's presence in a consumer-grade router firmware used in many home and small office networks makes it a serious concern. Attackers on the same local network could exploit this flaw to gain control over the device, intercept or manipulate network traffic, or disrupt network services.

Potential Impact

The exploitation of CVE-2024-30607 can have severe consequences for organizations and individuals relying on Tenda FH1203 routers. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code with elevated privileges. This can result in interception or manipulation of network traffic, unauthorized access to internal networks, disruption of network availability, and potential pivoting to other connected systems. Given the router's role as a gateway device, the impact extends beyond the device itself to the broader network environment. Organizations may face data breaches, operational disruptions, and loss of trust. The vulnerability's low attack complexity and lack of required user interaction increase the likelihood of exploitation in environments where the attacker has local network access. Although no known exploits are currently in the wild, the high CVSS score and nature of the vulnerability warrant urgent attention to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2024-30607, organizations should first check for firmware updates from Tenda addressing this vulnerability and apply them promptly once available. In the absence of an official patch, network administrators should restrict access to the router's management interfaces to trusted hosts only and disable any unnecessary services that could be exploited. Implement network segmentation to isolate vulnerable devices from critical infrastructure and untrusted networks. Monitoring network traffic for unusual activity around the router can help detect exploitation attempts. Additionally, consider replacing affected devices with models from vendors with a stronger security track record if timely patches are not forthcoming. Employing strong authentication mechanisms and regularly auditing device configurations will further reduce risk. Finally, educating users about the risks of local network attacks and maintaining an inventory of vulnerable devices will support proactive defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dc3b7ef31ef0b58ddb4

Added to database: 2/25/2026, 9:46:43 PM

Last enriched: 2/26/2026, 2:11:36 PM

Last updated: 4/12/2026, 9:24:00 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses